Author of the publication

A Review of MongoDB and Singularity Container Security in regards to HIPAA Regulations.

, , , , , and . UCC (Companion"), page 91-97. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guidance for the development of software engineering education programs., , , , , and . J. Syst. Softw., 49 (2-3): 163-169 (1999)Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers., , , and . Array, (2022)The assimilation of software engineering into the undergraduate computer science curriculum (panel session)., , , , and . SIGCSE, page 423-424. ACM, (2000)Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux Containers., , , and . ICCDA, page 58-66. ACM, (2020)A network protocol analyzer with tutorial., and . SAC, page 115-119. ACM, (1996)Application of Cyclomatic Complexity in Enterprise Architecture Frameworks., , and . IEEE Syst. J., 13 (3): 2166-2176 (2019)Secure NoSQL Based Medical Data Processing and Retrieval: The Exposome Project., , , , , and . UCC (Companion"), page 99-105. ACM, (2017)IEEE-CS/ACM Computing Curriculum Software Engineering Volume Project., , , , , , , and . CSEE&T, page 333-. IEEE Computer Society, (2003)Web Services for Higher Integrity Instrument Control., and . ICSOFT (2), page 151-156. SciTePress, (2010)Bumps on the information superhighway for K-12 education.. IEEE Technol. Soc. Mag., 17 (4): 25-28 (1998)